-
1
-
-
1142303699
-
Information sharing across private databases
-
[Agrawal et al., 20031 San Diego, CA.
-
[Agrawal et al., 20031 Agrawal, R., Evfimievski, A., and Srikant, R. (2003). Information sharing across private databases. In Proceedings of the 2003 ACM SZGMOD Znt '1 Conf: on Management of Data, San Diego, CA.
-
(2003)
Proceedings of the 2003 ACM SZGMOD Znt '1 Conf: On Management of Data
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
0242674432
-
Hippocratic databases
-
[Agrawal et al. Hong Kong. 20021
-
[Agrawal et al., 20021 Agrawal, Rakesh, Kiernan, Jerry, Srikant, Ramakrishnan, and Xu, Yirong (2002). Hippocratic databases. In 28th Int'l Conf: on Very Large Databases (VLDB), Hong Kong.
-
(2002)
28th Int'l Conf: On Very Large Databases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
84879524288
-
Informationtheoretic private information retrieval: A unified construction
-
[Beimel and Ishai, 20011
-
[Beimel and Ishai, 20011 Beimel, Amos and Ishai, Yuval(2001). Informationtheoretic private information retrieval: A unified construction. Lecture Notes in Computer Science, 2076.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
-
-
Beimel, A.1
Ishai, Y.2
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
[Bellare et al., 19961 Lecture Notes In Computer Science archive.
-
[Bellare et al., 19961 Bellare, M., Canetti, Ran, and Krawczyk, Hugo (1996). Keying hash functions for message authentication. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology table of contents, pages 1-15. Lecture Notes In Computer Science archive.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology Table Of Contents
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
17444370055
-
Public key encryption with keyword search
-
[Bonch and Franklin, 20041
-
[Bonch and Franklin, 20041 Boneh, D. and Franklin, M. (2004). Public key encryption with keyword search. In Eurocrypt 2004, LNCS 3027, 56-73.
-
(2004)
Eurocrypt 2004, LNCS 3027
, pp. 56-73
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
[Cachin et al., 19991
-
[Cachin et al., 19991 Cachin, Christian, Micali, Silvio, and Stadler, Markus (1999). Computationally private information retrieval with polylogarithmic communication. Lecture Notes in Computer Science, 1 592.
-
(1999)
Lecture Notes in Computer Science
, vol.1
, pp. 592
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
0029541045
-
Private information retrieval
-
[Chor et al., 19951
-
[Chor et al., 19951 Chor, Benny, Goldreich, Oded, Kushilevitz, Eyal, and Sudan, Madhu (1995). Private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41-50.
-
(1995)
IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
9
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
[Gertner et al., 19981
-
[Gertner et al., 19981 Gertner, Yael, Ishai, Yuval, Kushilevitz, Eyal, and Malkin, Tal (1998). Protecting data privacy in private information retrieval schemes. In The Thirtieth Annual ACM Symposium on Theory of Computing, pages 15 1-1 60.
-
(1998)
The Thirtieth Annual ACM Symposium on Theory of Computing
, vol.1
, pp. 115-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
10
-
-
0023545076
-
How to play any mental game
-
Goldreich et al., 19871
-
[Goldreich et al., 19871 Goldreich, O., Micali, S., and Wigderson, A. (1987). How to play any mental game. In Proc. of 19th STOC, pages 21 8-229.
-
(1987)
Proc. Of 19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0003839182
-
-
[Goldreich, 20021 Final (incomplete) draft, version 1.4.
-
[Goldreich, 20021 Goldreich, Oded (2002). Secure multi-party computation. Final (incomplete) draft, version 1.4.
-
(2002)
Secure Multi-Party Computation
-
-
Goldreich, O.1
-
12
-
-
84883891962
-
Enhancing privacy and trust in electronic communities
-
[Huberman et al., 19991
-
[Huberman et al., 19991 Huberman, B. A., Franklin, M., and Hogg, T. (1999). Enhancing privacy and trust in electronic communities. In ACM Conference on Electronic Commerce, pages 78-86.
-
(1999)
ACM Conference on Electronic Commerce
, pp. 78-86
-
-
Huberman, B.A.1
Franklin, M.2
Hogg, T.3
-
13
-
-
84944905011
-
Homomorphic signature schemes
-
[Johnson et al., 20021
-
[Johnson et al., 20021 Johnson, Robert, Molnar, David, Song, Dawn Xiaodong, and Wagner, David (2002). Homomorphic signature schemes. In CT-RSA, pages 244-262.
-
(2002)
CT-RSA
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.X.3
Wagner, D.4
-
14
-
-
0001190474
-
The probabilistic communication complexicty of set intersection
-
[Kalyanasundaram and Schnitger 19921
-
[Kalyanasundaram and Schnitger, 19921 Kalyanasundaram, B. and Schnitger, G. (1 992). The probabilistic communication complexicty of set intersection. SIAM J. Discrete Mathematics.
-
(1992)
SIAM J. Discrete Mathematics
-
-
Kalyanasundaram, B.1
Schnitger, G.2
-
15
-
-
84944878354
-
-
[Menezes et al., 19961 CRC Press
-
[Menezes et al., 19961 Menezes, A., van Oorschot, P., and Vanstone, S (1996). Handbook of applied cryptography. CRC Press.
-
(1996)
Handbook Of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
84891450833
-
-
19951 [Parliament, Parliament, European Directive 951461EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
[Parliament, 19951 Parliament, European (1995). Directive 951461EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
-
(1995)
-
-
-
17
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
[Song et al., 20001
-
[Song et al., 20001 Song, Dawn Xiaodong, Wagner, David, and Perrig, Adrian (2000). Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44-55.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
18
-
-
77952589508
-
Building an encrypted and searchable audit log
-
[Waters et al., 20041
-
[Waters et al., 20041 Waters, Brent R., Balfanz, Dirk, Durfee, Glenn, and Smetters, D.K. (2004). Building an encrypted and searchable audit log. In The 11th Annual Network and Distributed System Security Symposium.
-
(2004)
The 11th Annual Network and Distributed System Security Symposium
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
|